Helpful also to focus on how the Good Team context creates new problems & opportunities for research & design:
Similar: Desire to detect, understand, & mitigate security problems in networks, systems, & hardware that the team is creating or using.
Different:
No need to hide offensive techniques that the state/Heine wants to keep using in secret. We want to expose those techniques.
No political sensitivity about creating biometric indicators of same/different which actually work & serve the design purpose.
Focus on actual threats caused by corruption in std. systems such as SSL certificates, package shipments, spyware & attackware in basic off-the-shelf materials, electronic hijacking of vehicles, etc.
Dealing with person replacement as a common/ubiquitous threat.
Reality of local eavesdropping (i.e. there is no privacy of your own residence).